cybersecurity

Google AI can detect malware in just 30 seconds

Google AI can detect malware in just 30 seconds

The most advanced version of the model Artificial intelligence (AI) that develops GoogleGemini 1.5 Pro, is capable of analyzing and…

Cybersecurity: London dismantles online scam site that operated around the world

London police announced Thursday that they had infiltrated a site used by 2,000 criminals to defraud online around the world,…

US blames Microsoft for ‘cascade of errors’ in Chinese hack

A harsh report from the US government found that an intrusion into the servers of Microsoft by a chinese hacker…

More than 15,000 Roku accounts affected by credential stuffing cyberattack

Roku has warned of a recent credential stuffing attack in which cybercriminals They managed to access more than 15,000 customer…

What TikTok knows about us and how to protect our privacy in the app

tiktok It is one of the most popular applications worldwide. With millions of users, it is also a target for…

WhatsApp will no longer allow you to capture profile photos

WhatsApp is working on a new feature for terminals with the Android operating system that will prevent platform users from…

Love in times of scams in cyberspace: fraudulent online dating and fake profiles

When the search for love takes a digital turn, it's essential to keep an eye out not only for the…

WhatsApp: so you can know where your application was opened

As we know, WhatsApp It is more than an instant messaging application, this app has become the most useful and…

AWS re:Invent 2023: Companies in Latin America will invest in cybersecurity and Artificial Intelligence

Cybersecurity and Artificial Intelligence will be the main investments in Information Technologies in Latin America during the next year, according…

Two zero-day vulnerabilities that affect routers are detected

The signature of cybersecurity Akamai has identified two zero-day vulnerabilities affecting routers and network video recording (NVR) equipment, which cybercriminals…

75% of parents believe that their children do not have enough information to make responsible use of the Internet

Still, one in four parents admits that they have never talked to their children about cybersecuritya relevant topic to be…

Whatsapp: mod distributed by Telegram hides spyware capable of stealing user data

An unofficial modification or 'mod' of the messaging application WhatsApp records more than 340,000 infections in just one month, which…

Why should you keep your cell phone’s Bluetooth off when you’re not using it?

Just as it happens with the Wifi, some people keep certain cell phone functions on. He Bluetooth is one of…

Technology at the service of the search for hostages in Gaza: this is how the computer equipment works

Specialists from different IT sectors Israelis They are dedicated to searching for traces of the hostages held in the Gaza…

Google wants to eliminate passwords: now we will use ‘passkeys’ to enter accounts

Google Work for a future without passwords. The technology giant welcomes passkeys as the default method to enter Google accounts…

The FPF suffers the hacking of its YouTube page: now it shows pirated download tutorials

The Peruvian Football Federation has suffered the hacking of its page Youtube. Through its social networks, the FPF confirmed that…

Do you usually leave your PC in sleep for a long time? You are putting her in grave danger.

In a world that is increasingly connected and dependent on technology, it is common for people to leave their computers…

How to use a passkey in our Google account? This is the step by step

Google is promoting the use of passkeys (access keys) to simplify and improve the security of our passwords. This technology…

This is how ‘carding’ operates, a method by which bank card data is stolen to carry out illegal actions

The National Institute of Cybersecurity (INCIBE) has warned about the recurring scams against users with the 'carding' method, which has…

This is how ‘USB condoms’ work to protect devices from malware infections

One of the ways to introduce infections in technological devices is through the transfer of data through USB ports, since…